PrivacyXray: Detecting Privacy Breaches in LLMs through Semantic Consistency and Probability Certainty Authors: Jinwen He, Yiyang Lu, Zijin Lin, Kai Chen, Yue Zhao | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes Authors: Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24 2025.06.24 2025.06.26 Literature Database
Amplifying Machine Learning Attacks Through Strategic Compositions Authors: Yugeng Liu, Zheng Li, Hai Huang, Michael Backes, Yang Zhang | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
DUMB and DUMBer: Is Adversarial Training Worth It in the Real World? Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
Smart-LLaMA-DPO: Reinforced Large Language Model for Explainable Smart Contract Vulnerability Detection Authors: Lei Yu, Zhirong Huang, Hang Yuan, Shiqi Cheng, Li Yang, Fengjun Zhang, Chenjie Shen, Jiajia Ma, Jingyuan Zhang, Junyi Lu, Chun Zuo | Published: 2025-06-23 2025.06.23 2025.06.25 Literature Database
VReaves: Eavesdropping on Virtual Reality App Identity and Activity via Electromagnetic Side Channels Authors: Wei Sun, Minghong Fang, Mengyuan Li | Published: 2025-06-21 | Updated: 2025-06-24 2025.06.21 2025.06.26 Literature Database
Privacy-Preserving LLM Interaction with Socratic Chain-of-Thought Reasoning and Homomorphically Encrypted Vector Databases Authors: Yubeen Bae, Minchan Kim, Jaejin Lee, Sangbum Kim, Jaehyung Kim, Yejin Choi, Niloofar Mireshghallah | Published: 2025-06-19 | Updated: 2025-07-01 2025.06.19 2025.07.03 Literature Database
Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability Authors: Shova Kuikel, Aritran Piplai, Palvi Aggarwal | Published: 2025-06-16 2025.06.16 2025.06.18 Literature Database